Re: [i2rs] Can I2RS focus on the "Over the Wire" data structure , not on how end point handle the "DataStore"?

"Susan Hares" <shares@ndzh.com> Wed, 01 June 2016 11:54 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C97E12D104 for <i2rs@ietfa.amsl.com>; Wed, 1 Jun 2016 04:54:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.096
X-Spam-Level:
X-Spam-Status: No, score=-1.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RDNS_NONE=0.793, T_DOS_OUTLOOK_TO_MX_IMAGE=0.01] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iIyvZM0LpVEE for <i2rs@ietfa.amsl.com>; Wed, 1 Jun 2016 04:54:41 -0700 (PDT)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EC7612B059 for <i2rs@ietf.org>; Wed, 1 Jun 2016 04:54:40 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.63;
From: Susan Hares <shares@ndzh.com>
To: 'Andy Bierman' <andy@yumaworks.com>, 'Linda Dunbar' <linda.dunbar@huawei.com>
References: <000601d1bad5$70523090$50f691b0$@ndzh.com> <20160531063840.GA21289@elstar.local> <00d501d1bb45$0da83500$28f89f00$@ndzh.com> <20160531142540.GA22420@elstar.local> <001401d1bb4e$cfaefd10$6f0cf730$@ndzh.com> <20160531171304.GA22857@elstar.local> <CABCOCHR2JChAg1zmKDy_qxVOGYVeTm9wGVLyxzpChb5Ht0uaww@mail.gmail.com> <20160531195123.GN17462@pfrc.org> <CABCOCHQka+BezA6pLSiyOPcTghgx-UKK5dY6y70nME_EFZxCZg@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F657EACE6D@dfweml501-mbb> <CABCOCHSWi=KjNBSxoqMDQniKLGDXX76YQMyVqbJirF=LoK6PHg@mail.gmail.com>
In-Reply-To: <CABCOCHSWi=KjNBSxoqMDQniKLGDXX76YQMyVqbJirF=LoK6PHg@mail.gmail.com>
Date: Wed, 01 Jun 2016 07:54:10 -0400
Message-ID: <00ab01d1bbfc$52b8f1e0$f82ad5a0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/related; boundary="----=_NextPart_000_00AC_01D1BBDA.CBAA5F20"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJdaenpM7ljbP1C/TwjkI20GPnldwI0uYM8AiAGwTkCHPlBSwI0/t9yATo5ZLkB9aHehgG1+t7BAkK1jpMB7Q8siALEfOhAnhkbPoA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/oxaTMlakXDK84K6Phj8WG4K64tQ>
Cc: 'Benoit Claise' <bclaise@cisco.com>, i2rs@ietf.org, 'Jeffrey Haas' <jhaas@pfrc.org>, 'Juergen Schoenwaelder' <j.schoenwaelder@jacobs-university.de>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] Can I2RS focus on the "Over the Wire" data structure , not on how end point handle the "DataStore"?
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jun 2016 11:54:43 -0000

Andy: 

 

The I2RS topology (based, l3, L2) models do not interact with local configuration.  The current implementation in ODL uses RESTCONF to send/receive.  Other implementations of ephemeral only seem to be working.  

The next step is the mixed ephemeral/normal config. 

 

I have pointed out several problems with draft-schoenw-netmod-revised-datastores-00  architecture. 

 

 

Sue 

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Tuesday, May 31, 2016 10:05 PM
To: Linda Dunbar
Cc: i2rs@ietf.org; Juergen Schoenwaelder; Alia Atlas; Benoit Claise; Jeffrey Haas; Susan Hares
Subject: Re: [i2rs] Can I2RS focus on the "Over the Wire" data structure , not on how end point handle the "DataStore"?

 

Hi,

 

If your graphic advice means "the requirements are good enough, move on"

then I agree.

 

The datastore framework would be nice to have, but it is very close

to the implementation details.  It is also attempting to be a superset of all

"accepted" implementation choices.

 

By "on the wire" we usually mean a protocol specification.

IMO, all that is needed (for editing) is a set of RESTCONF extensions.

Some people want to describe the I2RS desired behavior wrt/ how it

interacts with the local config. (and many more features...)

 

Perhaps a good first step would be ephemeral data models that do not

interact with the local config at all.  I2RS is the only protocol of concern and the

highest priority client.  I2RS just needs to support read/write/notify of ephemeral data.

If this is not acceptable then be prepared to wait until all the framework stuff is settled

and standardized.

 

 

Andy

 

 

 

 

On Tue, May 31, 2016 at 4:09 PM, Linda Dunbar <linda.dunbar@huawei.com> wrote:

IETF has been successful for past 20 years  in focusing on “Over the Wire” data structure.  It would be so much cleaner and straight forward if the YANG modules developed by I2RS  focusing on the “Over the Wire” data structure (and with NETMOD to focus on other aspects).

The “I2RS ephemeral State” has the needed description for the desired behavior  of the data received over I2RS interface. If we follow the IETF practice,  it is good enough. 

Internal implementation framework is always controversial, hard to converge, usually ending up with a document (if completed) that is too big and difficult to read. 

 

Providing some source code to show the internal implementation would be much more useful as a reference implementation. 

 

The draft-schoenw-netmod-revised-datastores-00 is on the architectural framework for datastores as they are used by network management protocols. IMHO, how data stores are used are internal to the end points. 

 

 <http://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0ahUKEwj50KWat4XNAhULxGMKHRhqDPQQjRwIBw&url=http%3A%2F%2Fwww.urbanblissmedia.com%2Fentrepreneur-rules-done-is-better-than-perfect%2F&psig=AFQjCNGKEiPB2iHSqyBiF5609pd72H0L7w&ust=1464822503865777> http://www.urbanblisslife.com/wp-content/uploads/2012/10/Done-is-Better-Than-Perfect.jpg

 

Linda Dunbar

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Tuesday, May 31, 2016 4:09 PM
To: Jeffrey Haas
Cc: Benoit Claise; i2rs@ietf.org; Juergen Schoenwaelder; Susan Hares; Alia Atlas
Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - Topic: Ephemeral State Requirements

 

Hi,

 

I am not convinced the IETF can be forced to function as if it were

a dev-group in some corporation.  This is a volunteer organization so

usually solution proposals come from people who have created a solution

and they want the WG to standardize it.

 

 

Andy

 

 

On Tue, May 31, 2016 at 12:51 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:

Andy,

On Tue, May 31, 2016 at 11:41:59AM -0700, Andy Bierman wrote:
> At some point the WG needs to agree on normative text instead of iterating
> on requirements forever.

IMO, it would be in I2RS's best interests if netconf/netmod provided drafts
in appropriately normative language covering I2RS requirements.  However,
we've been in a pathological cycle of:
"We don't understand, please give us requirements"
"We don't understand your requirements"
"You provided examples with your requirements that appear to be attempts to
change our protocol - don't do that."

The most recent revised-datastore draft would be a good place to document
where netmod(/netconf) believes ephemeral datastores (if that's the
instantiation) could live, and also how ephemeral configuration state could
interact with candidate, startup and running configuration.

yang-push covers much of our desired pub-sub behavior. (Yay!)

Discussion is required for how to tag security considerations impacting
transport into the yang model, in particular for notification.

Proposals for secondary identity and priority are also needed.

-- Jeff